Las Vegas, Nevada
Stefan Thom of Microsoft, who currently participates in TCG’s IoT group, will speak on Wed., Aug. 19, 8:30 – 9:30 a.m. on “How and Why to Make the IoT Trusted”. He will address establishing a strong hardware device identity to enable measurable trust for IoT devices and their data.
Thom also will participate in a panel session, also on Wed., Aug. 19, 4:30 p.m., on “The Biggest IoT Challenges Faced by Developers.” He will be joined by panelists David Kleidermacher, BlackBerry, Christian Legare, Micrium, and Chuck Byers, Cisco Systems.
The challenges a design engineer faces when attempting to make secure and reliable connections to the IoT are plentiful. May of them have been well documented, but many have not. In this panel session, we’ll uncover some of the issues that a designer may not be aware of, with potential solutions to those hurdles.
For more information, please click here.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.